Fortinet black logo

Administration Guide

Guest/contractor login

Copy Link
Copy Doc ID 5bf21617-1bf0-11ec-8c53-00505692583a:484595
Download PDF

The portal defaults to a guest or contractor login link which opens the default guest authentication page. To log into the network, guests and contractors must enter the required data fields on their account.

  1. From the Guest or Contractor Login page, the guest clicks the Start link to open the Welcome screen.
  2. Guests enter the Username and the Password that was provided to them by a printout, e-mail or SMS message.
  3. Guests click Download or Register to open the Registration screen.
  4. The fields that appear in the Registration screen are those that were defined in the guest/contractor template. Fields with an asterisk indicate to the guest that this information must be entered in order to register.
  5. The guest clicks Acceptable Use Policy to read, accept, and exit the Acceptable Use Policy page.
  6. The guest clicks Continue. If the host passes the endpoint compliance policy requirements, the successful landing page is displayed.
  7. If the host does not pass the endpoint compliance policy requirements, a remediation web page appears and directs the guest to correct the problems that inhibited opening his account.

The portal defaults to a guest or contractor login link which opens the default guest authentication page. To log into the network, guests and contractors must enter the required data fields on their account.

  1. From the Guest or Contractor Login page, the guest clicks the Start link to open the Welcome screen.
  2. Guests enter the Username and the Password that was provided to them by a printout, e-mail or SMS message.
  3. Guests click Download or Register to open the Registration screen.
  4. The fields that appear in the Registration screen are those that were defined in the guest/contractor template. Fields with an asterisk indicate to the guest that this information must be entered in order to register.
  5. The guest clicks Acceptable Use Policy to read, accept, and exit the Acceptable Use Policy page.
  6. The guest clicks Continue. If the host passes the endpoint compliance policy requirements, the successful landing page is displayed.
  7. If the host does not pass the endpoint compliance policy requirements, a remediation web page appears and directs the guest to correct the problems that inhibited opening his account.